Skip to content

Commit e8d2251

Browse files
committed
[Microsoft Defender portal](https://security.microsoft.com)
1 parent 9f4c14e commit e8d2251

22 files changed

+38
-34
lines changed

defender-endpoint/attack-surface-reduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ Whenever an attack surface reduction rule is triggered, a notification is displa
116116

117117
Also, when certain attack surface reduction rules are triggered, alerts are generated.
118118

119-
Notifications and any alerts that are generated can be viewed in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
119+
Notifications and any alerts that are generated can be viewed in the [Microsoft Defender portal](https://security.microsoft.com).
120120

121121
For specific details about notification and alert functionality, see: [Per rule alert and notification details](attack-surface-reduction-rules-reference.md#per-asr-rule-alert-and-notification-details), in the article **Attack surface reduction rules reference**.
122122

defender-endpoint/auto-investigation-action-center.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The following table compares the new, unified Action center to the previous Acti
4242
|---------|---------|
4343
|Lists pending and completed actions for devices and email in one location <br/>([Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) plus [Microsoft Defender for Office 365](/defender-office-365/mdo-about)|Lists pending and completed actions for devices <br/> ([Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) only) |
4444
|Is located at:<br/>[https://security.microsoft.com/action-center](https://security.microsoft.com/action-center) |Is located at:<br/>[https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center) |
45-
| In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, choose **Action center**. <p>:::image type="content" source="media/action-center-nav-new.png" alt-text="The navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-new.png"::: | In the Microsoft Defender portal, choose **Automated investigations** > **Action center**. <p>:::image type="content" source="media/action-center-nav-old.png" alt-text="An older version of the navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-old.png"::: |
45+
| In the [Microsoft Defender portal](https://security.microsoft.com), choose **Action center**. <p>:::image type="content" source="media/action-center-nav-new.png" alt-text="The navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-new.png"::: | In the Microsoft Defender portal, choose **Automated investigations** > **Action center**. <p>:::image type="content" source="media/action-center-nav-old.png" alt-text="An older version of the navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-old.png"::: |
4646

4747
The unified Action center brings together remediation actions across Defender for Endpoint and Defender for Office 365. It defines a common language for all remediation actions, and provides a unified investigation experience.
4848

@@ -57,7 +57,7 @@ You can use the unified Action center if you have appropriate permissions and on
5757

5858
To get to the unified Action center in the improved Microsoft Defender portal:
5959

60-
1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
60+
1. Go to the [Microsoft Defender portal](https://security.microsoft.com) and sign in.
6161

6262
2. In the navigation pane, select **Action center**.
6363

defender-endpoint/configure-device-discovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ You can customize the list of devices that are used to perform standard discover
3434

3535
## Set up device discovery
3636

37-
To set up device discovery, take the following configuration steps in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
37+
To set up device discovery, take the following configuration steps in the [Microsoft Defender portal](https://security.microsoft.com):
3838

3939
Navigate to **Settings** > **Device discovery**
4040

defender-endpoint/configure-endpoints-gp.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ search.appverid: met150
4040
4141
Check out [Identify Defender for Endpoint architecture and deployment method](deployment-strategy.md) to see the various paths in deploying Defender for Endpoint.
4242

43-
1. Open the GP configuration package file (`WindowsDefenderATPOnboardingPackage.zip`) that you downloaded from the service onboarding wizard. You can also get the package from the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
43+
1. Open the GP configuration package file (`WindowsDefenderATPOnboardingPackage.zip`) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://security.microsoft.com):
4444

4545
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
4646

@@ -183,7 +183,7 @@ For security reasons, the package used to Offboard devices will expire 7 days af
183183
> [!NOTE]
184184
> Onboarding and offboarding policies must not be deployed on the same device at the same time, otherwise this will cause unpredictable collisions.
185185
186-
1. Get the offboarding package from the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
186+
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com):
187187

188188
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Offboarding**.
189189

@@ -220,7 +220,7 @@ With Group Policy there isn't an option to monitor deployment of policies on the
220220

221221
## Monitor devices using the portal
222222

223-
1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
223+
1. Go to the [Microsoft Defender portal](https://security.microsoft.com).
224224

225225
2. Select **Devices inventory**.
226226

defender-endpoint/configure-endpoints-sccm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,7 @@ If you use Microsoft Configuration Manager current branch, see [Create an offboa
234234

235235
### Offboard devices using System Center 2012 R2 Configuration Manager
236236

237-
1. Get the offboarding package from <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
237+
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com):
238238
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Offboarding**.
239239
1. Select Windows 10 or Windows 11 as the operating system.
240240
1. In the **Deployment method** field, select **System Center Configuration Manager 2012/2012 R2/1511/1602**.

defender-endpoint/configure-endpoints-script.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Check out [Identify Defender for Endpoint architecture and deployment method](de
3838

3939
## Onboard devices
4040

41-
1. Open the configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
41+
1. Open the configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://security.microsoft.com):
4242

4343
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Onboarding**.
4444

@@ -103,7 +103,7 @@ For security reasons, the package used to offboard devices expires seven days af
103103
> [!NOTE]
104104
> Onboarding and offboarding policies must not be deployed on the same device at the same time. Otherwise, unpredictable collisions might occur.
105105
106-
1. Get the offboarding package from <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
106+
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com):
107107

108108
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Offboarding**.
109109

@@ -138,7 +138,7 @@ Monitoring can also be done directly on the portal, or by using the different de
138138

139139
### Monitor devices using the portal
140140

141-
1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
141+
1. Go to the [Microsoft Defender portal](https://security.microsoft.com).
142142

143143
2. Select **Devices inventory**.
144144

defender-endpoint/configure-machines-asr.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ ms.date: 12/18/2023
3535

3636
> *Attack surface management card*
3737
38-
The *Attack surface management card* is an entry point to tools in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> that you can use to:
38+
The *Attack surface management card* is an entry point to tools in the [Microsoft Defender portal](https://security.microsoft.com) that you can use to:
3939

4040
- Understand how ASR rules are currently deployed in your organization.
4141
- Review ASR detections and identify possible incorrect detections.
@@ -50,7 +50,7 @@ Select **Go to attack surface management** \> **Reports** \> **Attack surface re
5050
> [!NOTE]
5151
> To access Microsoft Defender portal, you need a Microsoft 365 E3 or E5 license and an account that has certain roles on Microsoft Entra ID. [Read about required licenses and permissions](/defender-xdr/prerequisites).
5252
53-
For more information about ASR rule deployment in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, see [Optimize ASR rule deployment and detections](configure-machines-asr.md).
53+
For more information about ASR rule deployment in the [Microsoft Defender portal](https://security.microsoft.com), see [Optimize ASR rule deployment and detections](configure-machines-asr.md).
5454

5555
## Related topics
5656

defender-endpoint/configure-machines.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endp
4040

4141
*The device configuration management page*
4242

43-
You can track configuration status at an organizational level and quickly take action in response to poor onboarding coverage, compliance issues, and poorly optimized attack surface mitigations through direct, deep links to device management pages on Microsoft Intune and <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
43+
You can track configuration status at an organizational level and quickly take action in response to poor onboarding coverage, compliance issues, and poorly optimized attack surface mitigations through direct, deep links to device management pages on Microsoft Intune and [Microsoft Defender portal](https://security.microsoft.com).
4444

4545
In doing so, you benefit from:
4646

@@ -88,6 +88,6 @@ If you have been assigned other roles, ensure you have the necessary permissions
8888
|:---|:---
8989
|[Get devices onboarded to Defender for Endpoint](configure-machines-onboarding.md)|Track onboarding status of Intune-managed devices and onboard more devices through Intune. |
9090
|[Increase compliance to the Defender for Endpoint security baseline](configure-machines-security-baseline.md)|Track baseline compliance and noncompliance. Deploy the security baseline to more Intune-managed devices. |
91-
| [Optimize ASR rule deployment and detections](configure-machines-asr.md)|Review rule deployment and tweak detections using impact analysis tools in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>. |
91+
| [Optimize ASR rule deployment and detections](configure-machines-asr.md)|Review rule deployment and tweak detections using impact analysis tools in the [Microsoft Defender portal](https://security.microsoft.com). |
9292

9393
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/device-health-microsoft-defender-antivirus-health.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ To access the Device health and antivirus compliance report in the Microsoft Def
6666
6767
To assign permissions, follow these steps:
6868

69-
1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> using account with Security administrator or Global administrator role assigned.
69+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) using account with Security administrator or Global administrator role assigned.
7070

7171
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Roles** (under **Permissions**).
7272

defender-endpoint/device-health-reports.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ To access the Device health and antivirus compliance report in the Microsoft Def
6565

6666
To Assign these permissions:
6767

68-
1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> using account with Security administrator or Global administrator role assigned.
68+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) using account with Security administrator or Global administrator role assigned.
6969

7070
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Roles** (under **Permissions**).
7171

0 commit comments

Comments
 (0)